Resource Library:

AFCEA offers a wide range of white papers, EBooks, case studies, event videos and analytical content in our Resource Library. These documents may be relevant to your work and of interest to you as a member of the global defense, security and intelligence community. The content updates often so please bookmark this page and come back frequently.

Registration is required to access the documents. This registration information is minimal and is only shared with the sponsor of the specific document you access.

For information regarding posting content in the Resource Library, please contact Jennifer Deuterman by phone (703) 631-6181 or Email or your SIGNAL account executive.

Filter the library by ...

   

The Cyber Edge July 2020
Provided By: AFCEA   Send Email to POC   View Content   Jul 2020
Network data collection, analysis and sharing are core to cyber defense, and Tinisha McMillan is on a mission to improve all three.

Meeting Cyber SA and NetOps Challenges with IQ-Core Software
Provided By: PacStar   Send Email to POC   View Content   Jun 2020
Cyber Situational Awareness, (SA) is top of mind for DoD decision makers. There is a critical need across defense information systems for cyber security SA that enables cyber professionals and decision makers to gain a clearer picture of what is happening across DoD networks and ultimately, a bird's-eye view of the entire digital ecosystem.

Over the past several years, Defense Information Systems Agency (DISA) and other DoD agencies have focused on converging functions such as cyber SA, defensive cyber operations, and network operations (NetOps) in order to reduc ...

Open Source Software and Mission-Critical Applications: A Cautionary Tale
Provided By: AFCEA   Send Email to POC   View Content   May 2020
AFCEA International Cyber Committee The efficiencies of using and embedding open source software imply a number of risks. AFCEA Cyber Committee members have examined the origins of the OSS trend, its motivation and some of these risks and drawn an analogy to previous quality control experiences. Members offer suggestions for mitigating the risks when building systems they intend to trust.

Small Business Cybersecurity
Provided By: AFCEA   Send Email to POC   View Content   May 2020
AFCEA International Small Business Committee and Cyber Committee Rapid technology changes create new security vulnerabilities that require small businesses to expend resources to remain compliant. The fundamental problem is twofold: increasing technology complexity and competition for training security professionals. Members of the Small Business and Cyber committees suggest best practices, recommendations and information resources for small businesses to address these issues

The Who, What, Why and How of DDoS Attacks: A Guide for IT Pros
Provided By: AFCEA   Send Email to POC   View Content   May 2020
The IT industry has seen a major increase of Distributed Denial of Service (DDoS) attacks over the past several years. The December 2019 New Orleans cyberattack is such an example: This attack combined a classic ransomware deployment with a DDoS attack. The DDoS upward trend promises to continue. DDoS attacks date back to the dawn of the public internet, but the force is strong with this one. According to a 2018 report from International Data Group (IDG), the median downtime caused by a DDoS attack is 7 to 12 hours. Using an estimate from Gartner of $5,600 per minute of ...

The Cyber Edge April 2020
Provided By: AFCEA   Send Email to POC   View Content   Apr 2020
Daily cyber attacks and other threats naturally take up the short-term attention of many governmental agencies, but there is a need for a more strategic look at risks to the nation's critical infrastructure.

The U.S. Cybersecurity Industrial Base and National Security
Provided By: AFCEA   Send Email to POC   View Content   Feb 2020
This white paper conveys to U.S. national security policy makers and decision makers observations and recommendations regarding the nation's cybersecurity industrial base and this sector's ability to support and strengthen the national security of the United States.

The Cyber Edge January 2020
Provided By: AFCEA   Send Email to POC   View Content   Jan 2020
FBI Strives to Keep Ahead of Cyber Adversaries.
A rapidly changing threat environment compels increased cooperation.

The Cyber Edge October 2019
Provided By: AFCEA   Send Email to POC   View Content   Oct 2019
Cyber policy traditionally has focused more on enterprise networks than tactical systems, according to Nancy Kreidler, the Army's new leader for the Cybersecurity and Information Assurance Directorate within the Office of the Chief Information Officer/G-6. But new initiatives emphasize cybersecurity in the tactical environment, including networks, weaponry and any other systems used by warfighters.

Cyber Insurance
Provided By: AFCEA   Send Email to POC   View Content   Sep 2019
The Cyber Insurance Subcommittee of AFCEA International's Cyber Committee concluded cyber insurance is useful in risk transference but with some important caveats. For example, a purchase decision is contingent on individual company circumstances, such as revenue, risk tolerance, board guidance and regulatory environment relative to protected categories of information. In addition, every purchase decision should be critically reviewed regarding the extent of exclusions to coverage in each policy. The subcommittee also concluded that it remains in the indeterminate futur ...

The Cyber Edge July 2019
Provided By: AFCEA   Send Email to POC   View Content   Aug 2019
The whole is greater than the sum of its parts when the two combine forces for information technology. BY ROBERT K. ACKERMAN The U.S. Army is building a tighter relationship with industry to tap commercial expertise and avoid long procurement delays that often render new information technologies obsolete before they are fielded

The Cyber Edge April 2019
Provided By: AFCEA   Send Email to POC   View Content   May 2019
This edition of The Cyber Edge celebrates and recognizes the contributions of women in cybersecurity and STEM. All of the articles in the section were written by women and feature expert opinions on operating in a time where information often can be a weapon.

MEASURING SECURITY: Making Sense Out of a Modern-Day Tower of Babel
Provided By: AFCEA   Send Email to POC   View Content   Mar 2019
Despite obvious and compelling needs for ways to measure security, AFCEA's Cyber Committee found that there is no consensus about how to measure security. To the contrary, its members found that the security metrics are all over the map with most organizations admitting in confidential discussions that they are not comfortable with the metrics they are using.

AFCEA 2019 Army Signal Conference Solutions Showcase
Provided By: AFCEA   Send Email to POC   View Content   Mar 2019
2019 AFCEA Army Signal Conference Solutions Showcase Compendium
Prior to the conference, the U.S. Army identified opportunities for industry to offer potential solutions to problems the service and joint force must address both today and in the near future. The list included cloud and application migration/enterprise/hybrid cloud strategy; data cleansing; total army asset visibility/configuration management; risk management framework optimization; continuous cyber security compliancy monitoring; insider threat, zero trust environment; and protected data.

This ...

TechNet Augusta 2018 Solutions Showcase Compendium
Provided By: AFCEA   Send Email to POC   View Content   Aug 2018
As part of TechNet Augusta 2018, the U.S. Army identified 11 areas as opportunities for the private sector to share potential solutions for the problems the service faces in the cyber electromagnetic activities arena. The association reached out to industry and received more than 40 potential solutions from a range of innovators with technical and thought-provoking approaches to addressing difficult problems. Read how entrepreneurs, pioneers and large companies recommend the Army solve some of their biggest challenges.

Big Data Analytics and Cybersecurity: Three Challenges, Three Opportunities - By: AFCEA Cyber Committee
Provided By: AFCEA   Send Email to POC   View Content   Jan 2018
This white paper provides recommendations on the applications of big data analytics and data science generally to the cybersecurity domain. It examines ways in which big data can be used to improve predictive analytics and to detect anomalous behavior that may be indicative of cybersecurity problems such as exploits or attacks. This paper also
examines the special challenges the security of big data environments
pose given the enhanced value of information that is made part of and subject to analysis within such environments. In addition, it discusses the implica ...

The Cyber Edge - April 2017
Provided By: AFCEA   Send Email to POC   View Content   Apr 2017
The April 2017 version of SIGNAL's quarterly The Cyber Edge examines solutions being pursued across a range of theaters in the cyber realm.
- U.S. Navy Fleet Cyber Command Chief Rear Adm. Michael M. Gilday, USN, describes the challenges facing the sea service in cyberspace.
- Research into quantum security already is leading to applications in that esoteric area.
- A new commercial approach to cybersecurity effectively renders a network invisible to attackers.
- Cyber warriors must change their tactics on the fly as adversaries continue to innovate.

Big Data Analytics and Cybersecurity: Three Challenges, Three Opportunities - By: AFCEA Cyber Committee
Provided By: AFCEA   Send Email to POC   View Content   Jan 2017
This white paper provides recommendations on the applications of big data analytics and data science generally to the cybersecurity domain. It examines ways in which big data can be used to improve predictive analytics and to detect anomalous behavior that may be indicative of cybersecurity problems such as exploits or attacks. This paper also
examines the special challenges the security of big data environments
pose given the enhanced value of information that is made part of and subject to analysis within such environments. In addition, it discusses the implica ...

Key Cyber Issues and Recommendations: A Way Forward
Provided By: AFCEA   Send Email to POC   View Content   Jan 2017
Given the breakneck speed of technological change, challenges associated with developing/issuing national policy and concomitant adversary capabilities, government often finds itself behind the curve with respect to coordinated
cybersecurity readiness and response. The sheer size and number of agencies with their various systems, missions and legal mandates make it difficult to know how major cyber threats should be addressed and cyber events can be mitigated. Decisions on response actions are delayed or rejected due to lack of understanding on the consequences of th ...

Recommended Context and Framework for a National Cyber Information Sharing Initiative
Provided By: AFCEA   Send Email to POC   View Content   Oct 2016
There has been increased public dialogue recently regarding the importance, potential benefits and urgency of sharing cyber-related information. The inference from much of the dialogue is
that information sharing is viewed as a primary means to improve the nation's cybersecurity posture. AFCEA's Cyber Committee has been evaluating the topic of information sharing. This paper provides additional recommendations for establishing the
standards and implementation of an effective National Information Sharing Infrastructure.